<H1>
Ethical Hacking
</H1> |
<H2> ETHICAL HACKING </H2> |
<H2> Sunday, 19 April 2020 </H2> |
<H2>
What is keylogger? </H2> |
<H2>
How does hacker use keylogger to hack social media account and steal important data for money extortion and many uses of keylogger ? </H2> |
<H2>
Types of keylogger? </H2> |
<H2> =================== </H2> |
<H2>
</H2> |
<H2>
Keylogger is a tool that hacker use to monitor and record the keystroke you made on your keyboard. Keylogger is the action of recording the keys struck on a keyboard and it has capability to record every keystroke made on that system as well as monitor screen recording also. This is the oldest forms of malware. </H2> |
<H2> </H2> |
<H2> Sometimes it is called a keystroke logger or system monitor is a type of surveillance technology used to monitor and record each keystroke type a specific computer's keyboard. It is also available for use on smartphones such as Apple,I-phone and Android devices. </H2> |
<H2> </H2> |
<H2> A keylogger can record instant messages,email and capture any information you type at any time using your keyboard,including usernames password of your social media ac and personal identifying pin etc thats the reason some hacker use it to hack social media account for money extortion. </H2> |
<H2> ====================== </H2> |
<H2> Use of keylogger are as follows- </H2> |
<H2>
1-Employers to observe employee's computer activity. </H2> |
<H2>
2-Attacker / Hacker used for hacking some crucial data of any organisation for money extortion. </H2> |
<H2>
3-Parental Control is use to supervise their children's internet usage and check to control the browsing history of their child. </H2> |
<H2>
4-Criminals use keylogger to steal personal or financial information such as banking details credit card details etc and then which they will sell and earn a good profit. </H2> |
<H2>
5-Spouse/Gf tracking-if you are facing this issue that your Spouse or Gf is cheating on you then you can install a keylogger on her cell phone to monitor her activities over the internet whatever you want such as check Whats app, facebook and cell phone texts messages etc . </H2> |
<H2> ===================== </H2> |
<H2>
</H2> |
<H2>
Basically there are two types of keylogger either the software or hardware but the most common types of keylogger across both these are as follows- </H2> |
<H2> 1-API based keylogger </H2> |
<H2> 2-Form Grabbing Based Keylogger </H2> |
<H2> 3-Kernal Based Keylogger </H2> |
<H2> 4-Acoustic Keylogger ETC . </H2> |
<H2> ==================== </H2> |
<H2> How to detect keylogger on a system? </H2> |
<H2> An antikeylogger is a piece of software specially designed to detect it on a computer. </H2> |
<H2> Sometype of keylogger are easily detected and removed by the best antivirus software. </H2> |
<H2> You can view the task manager(list of current programs) on a windows PC by Ctrl+Alt+Del to detect it. </H2> |
<H2> Use of any software to perform any illegal activity is a crime, Do at your own risk. </H2> |
<H2> Saturday, 8 February 2020 </H2> |
<H2>
</H2> |
<H2> Saturday, 15 June 2019 </H2> |
<H2> Wednesday, 3 April 2019 </H2> |
<H2>
MOST USEFUL HACKING TOOL </H2> |
<H2>
1-Nmap-Network Mapper is popular and free open source hacker's tool.It is mainly used for discovery and security auditing.It is used for network inventory,inspect open ports manage service upgrade, as well as to inspect host or service uptime.Its advantages is that the admin user can monitor whether the network and associated nodes require patching. </H2> |
<H2>
</H2> |
<H2>
2-Haschat-It is the self-proclaimed world's fastest password recovery tool. It is designed to break even the most complex password. It is now released as free software for Linux, OS X, and windows. </H2> |
<H2>
</H2> |
<H2>
3-metasploit-It is an extremely famous hacking framework or pentesting. It is the collection of hacking tools used to execute different tasks. It is a computer severity framework which gives the necessary information about security vulnerabilities. It is widely used by cyber security experts and ethical hackers also. </H2> |
<H2>
</H2> |
<H2>
4-Acutenix Web Vulnerability Scanner- It crawls your website and monitor your web application and detect dangerous SQL injections.This is used for protecting your business from hackers. </H2> |
<H2>
5-Aircrack-ng - This tool is categorized among WiFi hacking tool. It is recommended for beginners who are new to Wireless Specefic Program. This tool is very effective when used rightly. </H2> |
<H2>
6-Wireshark-It is a network analyzer which permit the the tester to captyre packets transffering through the network and to monitor it. If you would like to become a penetration tester or cyber security expert it is necessary to learn how to use wireshark. It examine networks and teoubleshoot for obstacle and intrusion. </H2> |
<H2>
7-Putty-Is it very beneficial tool for a hacker but it is not a hacking tool. It serves as a client for Ssh and Telnet, which can help to connect computer remotely. It is also used to carry SSH tunneling to byepass firewalls. So, this is also one of the best hacking tools for hackers. </H2> |
<H2>
8-THC Hydra- It is one of the best password cracker tools and it consist of operative and highly experienced development team. It is the fast and stable Network Login Hacking Tools that will use dictonary or bruteforce attack to try various combination of passwords against in a login page.This Tool is also very useful for facebook hacking , instagram hacking and other social media platform as well as computer folder password hacking. </H2> |
<H2>
9-Nessus-It is a proprietary vulnerability scanner developed by tennable Network Security. Nessus is the world's most popular vulnerability scanner according to the surveys taking first place in 2000,2003,2006 in security tools survey. </H2> |
<H2>
10-Ettercap- It is a network sniffing tool. Network sniffing is a computer tool that monitors,analyse and defend malicious attacks with packet sniffing enterprise can keep track of network flow. </H2> |
<H2>
11-John the Ripper-It is a free famous password cracking pen testing tool that is used to execute dictionary attacks. It is initially developed for Unix OS. The Ripper has been awarded for having a good name.This tools can also be used to carry out different modifications to dictionary attacks. </H2> |
<H2>
12-Burp Suite- It is a network vulnerability scanner,with some advance features.It is important tool if you are working on cyber security. </H2> |
<H2>
13-Owasp Zed Attack Proxy Project-ZAP and is abbreviated as Zed Attack Proxy is among popular OWASP project.It is use to find vulnerabilities in Web Applications.This hacking and penetesting tool is very easy to use as well as very efficient.OWASP community is superb resource for those people that work with Cyber Security. </H2> |
<H2>
14-Cain & Abel-It is a password recovery tool for Microsoft Operating System. It allow easy recovery of various kinds of passwords by sniffing the networks using dictonary attacks. </H2> |
<H2>
15-Maltego- It is a platform that was designed to deliver an overall cyber threat pictures to the enterprise or local environment in which an organisation operates. It is used for open source intelligence and forensics developed by Paterva.It is an interactive data mining tool. </H2> |
<H2>
These are the Best Hacking Tools and Application Which are very useful for penetration testing to gain unauthorized access for steal crucial data, wi-fi hacking , Website hacking ,Vulnerability Scanning and finding loopholes,Computer hacking, Malware Scanning etc. </H2> |
<H2>
This post is only for educational purpose to know about top hacking tools which are very crucial for a hacker to gain unauthorized access. We are not responsible for any type of crime. </H2> |
<H2> </H2> |
<H2> Friday, 18 January 2019 </H2> |
<H2>
What is the terminologies in ethical hacking? </H2> |
<H2> Here are a few key terms that you will hear in discussion about hackers and what they do: </H2> |
<H2> 1-Backdoor-A secret pathway a hacker uses to gain entry to a computer system. </H2> |
<H2> 2-Adware-It is the softw-are designed to force pre-chosen ads to display on your system. </H2> |
<H2> 3-Attack-That action performs by a attacker on a system to gain unauthorized access. </H2> |
<H2> 4-Buffer Overflow-It is the process of attack where the hacker delivers malicious commands to a system by overrunning an application buffer. </H2> |
<H2> 5-Denial-of-Service attack (DOS)-A attack designed to cripple the victim's system by preventing it from handling its normal traffic,usally by flooding it with false traffic. </H2> |
<H2> 6-Email Warm-A virus-laden script or mini-program sent to an unsuspecting victim through a normal-looking email message. </H2> |
<H2> 7-Bruteforce Attack-It is an automated and simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords,again & again until it gets in from bruteforce dictionary. </H2> |
<H2> 8-Root Access-The highest level of access to a computer system,which can give them complete control over the system. </H2> |
<H2> 9-Root Kit-A set of tools used by an intruder to expand and disguise his control of the system.It is the stealthy type of software used for gain access to a computer system. </H2> |
<H2> 10-Session Hijacking- When a hacker is able to insert malicious data packets right into an actual data transmission over the internet connection. </H2> |
<H2> 11-Phreaker-Phreakers are considered the original computer hackers who break into the telephone network illegally, typically to make free longdistance phone calls or to tap lines. </H2> |
<H2> 12-Trojan Horse-It is a malicious program that tricks the computer user into opening it.There designed with an intention to destroy files,alter information,steal password or other information. </H2> |
<H2> 13-Virus-It is piece of code or malicious program which is capable of copying itself has a detrimental effect such as corrupting the system od destroying data. Antivirus is used to protect the system from viruses. </H2> |
<H2> 14-Worms-It is a self reflicating virus that does not alter files but resides in the active memory and duplicate itself. </H2> |
<H2> 15-Vulnerability-It is a weakness which allows a hacker to compromise the security of a computer or network system to gain unauthorized access. </H2> |
<H2> 16-Threat-A threat is a possible danger that can exploit an existing bug or vulnerability to comprise the security of a computer or network system. Threat is of two types-physical & non physical. </H2> |
<H2> 17-Cross-site Scripting-(XSS) It is a type of computer security vulnerability found in web application.It enables attacker to inject client side script into web pages viwed by other users. </H2> |
<H2> 18-Botnet-It is also known as Zombie Army is a group of computers controlled without their owner's knowledge.It is used to send spam or make denial of service attacks. </H2> |
<H2> 19-Bot- A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a period than a human operator could do it.Example-Sending HTTP, FTP oe Telnet at a higer rate or calling script to creat objects at a higher rate. </H2> |
<H2> 20-Firewall-It is a designed to keep unwanted intruder outside a computer system or network for safe communication b/w system and users on the inside of the firewall. </H2> |
<H2> 21-Spam-A spam is unsolicited email or junk email sent to a large numbers of receipients without their consent. </H2> |
<H2> 22-Zombie Drone-It is defined as a hi-jacked computer that is being used anonymously as a soldier or drone for malicious activity.ExDistributing Unwanted Spam Emails. </H2> |
<H2> 23-Logic Bomb-It is a type of virus upload in to a system that triggers a malicious action when certain conditions are met.The most common version is Time Bomb. </H2> |
<H2> 24-Shrink Wrap code-The process of attack for exploiting the holes in unpatched or poorly configured software. </H2> |
<H2> 25-Malware-It is an umbrella term used to refer a variety of intrusive software, including computer viruses,worms,Trojan Horses,Ransomeware,spyware,adware, scareware and other malicious program. </H2> |
<H2>
Follow me on instagram-anoymous_adi </H2> |
<H2> Wednesday, 16 January 2019 </H2> |
<H2> Tuesday, 15 January 2019 </H2> |
<H2> adinagaich.blogspot.com </H2> |
<H2> Translate </H2> |
<H2> Blog Archive </H2> |
<H2> About Me </H2> |
<H2> Ethical Hacking </H2> |
<H3>
What is Keylogger? Uses of Keylogger in Hacking ?
</H3> |
<H3>
USE OF CRYPTOGRAPHY IN HACKING
</H3> |
<H3>
</H3> |
<H3>
FOOTPRITING AND INFORMATION GATHERING USED IN HACKING
</H3> |
<H3>
Best Hacking Tools
</H3> |
<H3>
TERMINOLOGIES OF ETHICAL HACKING
</H3> |
<H3>
PHASES OF HACKING
</H3> |
<H3>
RECONNAISSANCE IN ETHICAL HACKING
</H3> |
<H4>
The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography. </H4> |
<H4>
As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business. </H4> |
<H4>
Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information . </H4> |
<H4>
Or </H4> |
<H4>
Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it. </H4> |
<H4>
In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human. </H4> |
<H4>
This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN . </H4> |
<H4>
</H4> |
<H4>
How to Encrypt and Decrypt the text in Cryptography? </H4> |
<H4>
Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" </H4> |
<H4>
Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html" </H4> |
<H4>
Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form. </H4> |
Social
Social Data
Cost and overhead previously rendered this semi-public form of communication unfeasible.
But advances in social networking technology from 2004-2010 has made broader concepts of sharing possible.